Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Saudi Arabia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.247.198.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54318
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.247.198.140.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012900 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 19:06:06 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 140.198.247.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 140.198.247.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.179.134.5 attack
Invalid user lixu from 193.179.134.5 port 53496
2019-07-27 23:53:47
78.191.32.75 attackspambots
Invalid user pi from 78.191.32.75 port 45110
2019-07-27 23:43:44
78.232.145.24 attackbotsspam
SSH Brute-Forcing (ownc)
2019-07-28 00:19:31
37.230.117.69 attackspambots
Jul 27 11:27:46 xb3 sshd[16410]: reveeclipse mapping checking getaddrinfo for andreas-games.ru [37.230.117.69] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 27 11:27:46 xb3 sshd[16410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.230.117.69  user=r.r
Jul 27 11:27:48 xb3 sshd[16410]: Failed password for r.r from 37.230.117.69 port 45658 ssh2
Jul 27 11:27:48 xb3 sshd[16410]: Received disconnect from 37.230.117.69: 11: Bye Bye [preauth]
Jul 27 11:41:31 xb3 sshd[9828]: reveeclipse mapping checking getaddrinfo for andreas-games.ru [37.230.117.69] failed - POSSIBLE BREAK-IN ATTEMPT!
Jul 27 11:41:31 xb3 sshd[9828]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.230.117.69  user=r.r
Jul 27 11:41:34 xb3 sshd[9828]: Failed password for r.r from 37.230.117.69 port 33026 ssh2
Jul 27 11:41:34 xb3 sshd[9828]: Received disconnect from 37.230.117.69: 11: Bye Bye [preauth]
Jul 27 11:46:59 xb3 sshd[10034........
-------------------------------
2019-07-27 23:22:05
58.118.188.6 attackbotsspam
Invalid user tuan from 58.118.188.6 port 45266
2019-07-27 23:45:24
222.181.11.133 attackspambots
Invalid user ali from 222.181.11.133 port 20331
2019-07-27 23:50:08
152.32.191.57 attack
Invalid user james from 152.32.191.57 port 60064
2019-07-27 23:03:17
201.209.186.138 attackbots
Invalid user UBNT from 201.209.186.138 port 29301
2019-07-27 22:54:11
64.60.248.226 attack
Invalid user kodi from 64.60.248.226 port 54397
2019-07-27 23:44:15
103.21.148.16 attackspambots
Invalid user ftp1 from 103.21.148.16 port 24225
2019-07-27 23:10:05
103.44.98.179 attack
Many RDP login attempts detected by IDS script
2019-07-28 00:11:20
222.252.17.159 attackbots
Invalid user ubnt from 222.252.17.159 port 37487
2019-07-27 23:49:39
117.50.65.217 attackbotsspam
Invalid user user from 117.50.65.217 port 33604
2019-07-27 23:36:15
142.93.232.222 attackbotsspam
Invalid user web from 142.93.232.222 port 45346
2019-07-28 00:03:21
88.174.124.159 attackbotsspam
Invalid user user from 88.174.124.159 port 60046
2019-07-27 23:12:14

Recently Reported IPs

176.169.120.45 202.144.119.52 244.104.186.164 255.64.119.196
121.18.213.21 125.136.106.223 224.149.122.125 39.15.249.76
24.219.76.44 144.35.245.201 202.29.18.121 35.104.190.80
116.54.194.53 141.241.147.135 89.150.242.153 143.181.7.222
51.172.138.38 91.6.122.33 146.208.54.3 204.220.99.190